DataSecurity Plus | May 19, 2021Healthcare cybersecurity: Our 6-step plan to secure healthcare data The HIPAA Journal reported that "2020 was the worst ever year for healthcare industry data...
IT Security | May 12, 202110 essential cybersecurity tips for beginners Organizations today are challenged by an increased exposure to cyber threats. Attackers...
Log360 | March 30, 2021Azure security 101: Security essentials, logs, authentication, and more “Where necessity speaks, it demands”. This old saying seems particularly apt right now...
ADAudit Plus | March 24, 2021Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book] User logon activity needs to be audited to meet various security, operational, and...
Log360 | March 10, 2021Ransomware in 2021: What has changed? Detection and mitigation strategy A ransomware attack is a bug that we can't shake off. Or perhaps, it can even be called a...
Log360 | March 3, 2021Security operations center, Part 3: Finding your weakest link Any organization with data assets is a possible target for an attacker. Hackers use...
Log360 | February 18, 2021Dangerous defaults that put your IT environment at risk: IT security under attack In this blog in the “IT security under attack” series, we wanted to shed some light on an...
Log360 | January 21, 2021IT security under attack: Credential dumping attacks in Windows environments Most of the time, threat actors in the cybersecurity landscape don't employ advanced...
Log360 | December 18, 2020IT security under attack: Why are group memberships so crucial? Security groups either make or break your IT security. Group memberships are responsible...
IT Security | December 18, 2020Is Germany's official COVID-19 contact tracing app more viral than the virus? The COVID-19 pandemic forced several governments across the world to restrict civil...
Log360 | December 15, 2020Securing a distributed workspace: A cybersecurity checklist for long-term remote work One of the lasting changes brought about by the COVID-19 pandemic is that it forced...
Log360 | December 8, 2020IT security under attack: A typical day in the life of an IT admin or security analyst The job of IT admins and IT security analysts are, without a doubt, some of the most...